A popular request is to block certain content types from being served to clients. Squid currently can not do "content inspection" to decide on the file type based on the contents, but it is able to block HTTP replies based on the servers' content MIME Type reply.

The MIME Type reply is generally set correctly so browsers are able to pass the reply to the correct module (image, text, html, flash, music, mpeg, etc.)

One popular example is to block flash video, used by sites such as Youtube.
The MIME type for such content is "video/x-flv". Creating an ACL to block this is easy.

First, create an ACL which matches the MIME type in question:

acl deny_rep_mime_flashvideo rep_mime_type video/x-flv

Then create a HTTP Reply ACL which denies any replies with that MIME type:

http_reply_access deny deny_rep_mime_flashvideo

This has been verified to block Youtube flash video content.

If the content is blocked the following similar line will be seen in access.log:1282485682.146 903 127.0.0.1 TCP_DENIED_REPLY/403 3143 GET http://tc.v15.cache3.c.youtube.com/videoplayback? - DIRECT/208.117.252.163 text/html

OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported.

This process will allow us to store information of any kind within an image. This can be useful if you intend to send confidential information (such as a text document or a spreadsheet) to a person and do not want such information to be intercepted by someone else (such as the mail provider, a spy, police, etc. ..) We will use the technique of steganography to hide information within the image.

Data Embedding using OutGues:
Now here is how you do it: you need a text file (in this example we call it "hidden.txt" ) and a picture ( we call it "input.jpg" ) after that you issue the following command to hide your data ("hidden.txt") into the image file.

Instructions:NOTE: Before continuing, please make sure that all default repositories (exspecially partners' ones) and updates are enabled.

1) Download the script - here
2) Right-click the script you will use, go to proprieties and to the Permissions tab. Select Allow executing as program.Close the window.
3) Now left-click on the script and run it in terminal.

When a command in the package script returns error for some reason and the script exits with error, the package management system aborts their action and ends up with partially installed packages. When a package contains bugs in its removal scripts, the package may become impossible to remove and quite nasty.

For the package script problem of "package_name", you should look for:

Screenie a small tool to allow you to compose a fancy and stylish screen-shots. It is cross-platform (for Linux, Windows and Mac OS X) and very easy to use. You will have an impressive screen-shot in just one minute!

To run, go to Applications> Graphics> screenie, this with open up three windows: Intructions, screenie-qt and Parameters.

* The Instructions Windows provides very basic information about using the Screenie.
* The main window is screenie-qt, where you need to drag and drop the images / screenshots that required makeup (At most we can use three).
* The Parameters window can be used to change the configuration of the images. For example, distance, angle, opacity, etc.

bmon is a portable bandwidth monitor and rate estimator. It supports various input methods for different architectures. Various output modes exist, including an interactive curses interface, lightweight HTML output, and simple ASCII output. Statistics may be distributed over a network using multicast or unicast and collected at some point to generate a summary of statistics for a set of nodes.

Install bmon
For Ubuntu or Debian systems, either click this link or run the following command in a terminal

$ sudo apt-get install bmon

Using bmon:
Open a terminal and enter the command "bmon" and you should see the following output

Each Ubuntu release is named in two ways. The official name is the year and month combined, separated by a period. The release made in April 2010 was named 10.04, for example.

Releases also have nicknames, decided upon by Mark Shuttleworth, and humorously derived from types of animals. 8.04 has the nickname Hardy Heron. 8.10 is called Intrepid Ibex. Sometimes the animal component is dropped in formal conversation 8.04 is referred to simply as “Ubuntu Hardy”, or just “Hardy”.

Netactview is a graphical network connections viewer for Linux, similar in functionality with Netstat. It includes features like process information, host name retrieval, automatic refresh and sorting. It has a fully featured GTK 2 graphical interface.

Features:
* Shows all udp, tcp, udp6 and tcp6 network connections in an automatically refreshed list.
* The presented information includes protocol names, addresses, ports and connection states along with host names and process information.
* The connections list can be sorted by any of its columns.
* Refresh rates ranging from 1/16 to 4 seconds, or no automatic refresh can be selected.
* Connections can be seen for 3 seconds after they are closed giving you the chance to spot connections that last very little time.
* The unestablished connections can be filtered out.
* Multiple connections list snapshots can be saved in a formatted text file.

In the standard Ubuntu distribution and other distributions based on Gnome opening the .deb package should start the Gdebi package installer. Gdebi will install the package and all its dependencies.
In KDE based distributions, like Kubuntu, you will have to install Gdebi and open the package with it.

In the early 1980's Richard M. Stallman created the GNU project, whose goal was to provide the world with a Free Operating System (with the word "Free" with the same meaning as in "Freedom").

Since then, a lot of Free Software was developed and entire operating systems based only on Free Software were created. Unfortunately, some data is still stored in a format that is proprietary, secret and non-standard, made by corporations that want to retain control over the users of the software that generates such data.

The vrms program provides the facility for users of Debian-based Operating Systems (like Ubuntu Linux) to detect if their systems have any non-free software installed, so that the users can keep their computer "pure", without non-free software.

vrms can be installed using Synaptic Package Manager:

To execute it, just type "vrms" in the terminal and you will get the list of 'non-free' software installed on your system. For each program from 'non-free' installed, vrms displays an explanation of why it is non-free, if one is available. This explanation is usually from a list included in the vrms package itself, but other packages can provide additional lists of explanations, too.

So if you want a completely free (as in freedom!) operating system, you can use Use/ Install gNewsense instead of Ubuntu or others.

Darik's Boot and Nuke ("DBAN") is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

DBAN is a means of ensuring due diligence in computer recycling, a way of preventing identity theft if you want to sell a computer, and a good way to totally clean a Microsoft Windows installation of viruses and spyware. DBAN prevents or thoroughly hinders all known techniques of hard disk forensic analysis.

DBAN is a free software product that can be used at home or in a business at zero cost.

DBAN has all available drivers for SCSI disks and drivers for IDE, PATA, and SATA disks.
DBAN supports all Microsoft platforms and securely destroys FAT, VFAT, and NTFS filesytems and all unix platforms and securely destroys ReiserFS, EXT2, EXT3, EXT4, and UFS filesystems.

Installation:DBAN 2.2.6 Beta for CD-R and DVD-R media.
(Burn this file to a blank disc and boot the computer with it. Do not unzip this file.)
Burn this downloaded ISO file to a CD and boot off that CD (you need to configure your BISO settings to boot from the CD first). Follow the prompts and select your appropriate configuration options.

DBAN is easy to use and very secure, using multiple methods including the Gutmann method and the Mersenne twister.

The autonuke option from the first screen will automatically run through all detected disks, securely wiping them, so be careful with it.

The Mogrify program is a member of the ImageMagick suite of tool, use the mogrify program to re-size an image, blur, crop, despeckle, dither, draw on, flip, join, re-sample, and much more. This tool is similiar to convert except that the original image file is overwritten (unless you change the file suffix with the -format option) with any changes you request.

Imagemagick Mogrify is an easy to use, ligte, command prompt tool and capable of editting most of the image types.

Using Mogrify:
If you want to transform all the .tiff images in a directory to .jpg, you can do it with a single command:mogrify -format jpeg *.tiff

Create thumbnails using this command: mogrify -geometry 120x120 *.jpg

To reduce the size of any given image, use this command:mogrify -resize 50% *.jpg

You can resize all your JPEG images in a folder to a maximum dimension of 256x256 with this command:mogrify -resize 256x256 *.jpg

Convert PNG images to the JPEG format:mogrify -format jpg *.png

Rotate an Image using this commandmogrify -rotate "-90" test.jpg

Reduce Colours of any given image using this commandmogrify -colors 2 test.jpg

Monochrome the given image using this commandmogrify -monochrome test.jpg

Add Borders to given image using this commandmogrify -border 2x4 test.jpg

The first field says that this is the line for /dev/tty1. The second field says that it applies to run levels 2, 3, 4, and 5. The third field means that the command should be run again, after it exits (so that one can log in, log out, and then log in again). The last field is the command that runs mingetty on the first virtual terminal.

The above series of lines also use the "respawn" option to keep six mingetty processes running on the system. If someone tries to kill one of these processes as root, the process will simply be respawned. Only critical processes are set up in this way to keep them safe from anything else happening on the system.

If you're curious about these processes, check them out on the running system using command

$ ps -ef | grep getty

Now to enable the auto loging for a particular user, edit the /etc/inittab file and identify the terminal on which you want user to have auto login ...

1:12345:respawn:/sbin/mingetty --noclear --autologin username tty1

Reboot the system after making above changes and insure that init has spawned the new version of mingetty, and if all is well, will automatically log you on to the console.

Monitorix is a free, open source, lightweight system monitoring tool designed to monitorize as many services as possible. At this time it monitors from the CPU load and temperatures to the users using the system. Network devices activity, network services demand and even the devices' interrupt activity are also monitored, and more.

The current status of any corporate server with Monitorix installed can be accessed via a web browser.
Monitorix has been designed to be used under production UNIX/Linux servers, but due its simplicity and small size you may also use it to monitor embedded devices.

Installation:
Monitorix is under GPLv2 licensing and available for download on the project homepage as source code and in numerous packages. Rpm based system (RedHat / Fedora / Centos / Opensuse) can install Monitorix using command:

rpm -ivh monitorix-1.4.2-1.noarch.rpm

Configuration of Monitorix:
Before starting the monitorix daemon, be sure to adjust the /etc/monitorix.conf to your liking. For a complete list of options and features, see the man page for monitor.conf.

Read mail or send mail to other users. The mail utility allows you to compose, send, receive, forward, and reply to mail. mail has two main modes: compose mode, in which you create a message, and command mode, in which you manage your mail.

While mail is a powerful utility, it can be tricky for a novice user. It is most commonly seen nowadays in scripts. Most Linux distributions include several utilities that are richer in features and much easier to use: mailers built into browsers such as Mozilla and Firefox, graphical mail programs distributed with GNOME (Evolution) and KDE (Kmail), and the terminal-based, full-screen utilities pine and elm. The GNU Emacs editor can also send and receive mail.

Below is the mail command through with you can send mail to any given user ...

mail -s "System Log" nikesh@domain.com

This command sends a message to the user nikesh, with a subject line of "System Log" and the text of the message read from the system logfile /var/log/messages.

Below are few other command line option that you can use with the mail command ...

-s Specify subject on command line.
-c Send carbon copies to list of users.
-b Send blind carbon copies to list. List should be a comma-separated list of names.
-f Read in the contents of your mbox for processing; when you quit, mail writes undeleted messages back to this file.
-i Ignore tty interrupt signals. This is particularly useful when using mail on noisy phone lines.

Blogbench is a portable filesystem benchmark that tries to reproduce the load of a real-world busy file server. It stresses the filesystem with multiple threads performing random reads, writes, and rewrites in order to get a realistic idea of the scalability and the concurrency a system can handle.

It stresses the filesystem with multiple threads performing random reads, writes and rewrites in order to get a realistic idea of the scalability and the concurrency a system can handle.

Installation:
Download blogbench from here and type the following command to compile and install blogbench

# tar xvzf blogbench-1.1.tar.gz

# cd blogbench-1.1

# ./configure

# make

# make install

Using Blogbench:
The minimal way to run the test is to just give the path to an *empty* and writable directory:

# blogbench -d /path/to/the/directory

Blogbench will start the required threads and the test will run during 5 minutes. A final "score" will then be given as an indication of read and write performance.

Simple network top (sntop) is a curses-based console utility in the spirit of top that polls network hosts at a regular interval to determine their connectivity and displays the results in a pretty format. Advanced features are supported, such as automatic HTML generation of results, secure terminal mode, execution of an external file on connectivity changes, a daemon mode, and user/system configure files.

sntop uses fping (ping is supported, too) to determine connectivity of hosts, specified in a config file, on a regular interval. the results are displayed in a top-like format.

Installation and Configuration:
Download sntop from here and type the following command to install sntop

This is always fun to read, even it it’s old news, Here’s the very first Linux announcement:

From: torvalds@klaava.Helsinki.FI (Linus Benedict Torvalds)
Newsgroups: comp.os.minix
Subject: What would you like to see most in minix?
Summary: small poll for my new operating system
Message-ID: <1991Aug25.205708.9541@klaava.Helsinki.FI>
Date: 25 Aug 91 20:57:08 GMT
Organization: University of Helsinki

Hello everybody out there using minix -

I’m doing a (free) operating system (just a hobby, won’t be big and
professional like gnu) for 386(486) AT clones. This has been brewing
since april, and is starting to get ready. I’d like any feedback on
things people like/dislike in minix, as my OS resembles it somewhat
(same physical layout of the file-system (due to practical reasons)
among other things).

I’ve currently ported bash(1.08) and gcc(1.40), and things seem to work.
This implies that I’ll get something practical within a few months, and
I’d like to know what features most people would want. Any suggestions
are welcome, but I won’t promise I’ll implement them :-)

Linus (torvalds@kruuna.helsinki.fi)

PS. Yes – it’s free of any minix code, and it has a multi-threaded fs.
It is NOT protable (uses 386 task switching etc), and it probably never
will support anything other than AT-harddisks, as that’s all I have :-(.

di is a disk information utility, displaying everything that df does and more. It features the ability to display your disk usage in whatever format you desire/prefer/are used to. It is designed to be highly portable across many platforms.

di Displays usage information on mounted filesystems. Block values are reported in a human readable format. If the user or group has a disk quota, the values reported are adjusted according the quotas that apply to the user.
If file is specified, the usage information for the partition on which file is located is printed.